This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The breach of the Astros' database allegedly by members of the St. Louis Cardinals organization was a rare case, exposing one organization cyberspying on another; security experts say it's the first such attack in the sports world that has come to light. But competitive intelligence-gathering and spying -- whether it's casual conversations with a competitor, shoulder-surfing, deciphering a team manager's signals in mid-game, or even extreme cases like bugging conference rooms -- long have been a real threat and concern among corporations and sports organizations, experts say.

It should come as no surprise that industrial cyber espionage would become a nefarious option for companies outside the nation-state realm to keep tabs on, or to gain a competitive advantage over, rivals in their industry, security experts say.

"The recent focus on anything cyber espionage-related fingers overseas [threats] and foreign group attacks against the US" and others, says Nick Pelletier, senior consultant with incident response firm Mandiant, a FireEye company. "There's not a lot of discussion on things such as someone in the US hitting someone else in the US" to date.

"This is a wake-up call," he says of the Astros' breach.

Cases of one business spying on another in the US are unusual, and nowhere near the threat or pervasiveness of nation-state cyberspying. Mandiant's Pelletier says he hasn't seen any cases of business-on-business cyber espionage as yet, but it's something the firm is tracking.

"It's something we've been sort of keeping our eye on," he says. The most common form of industrial espionage to date, he says, is a "physical" attack, whether it's bribery or an insider leaking information for profit or other reasons. Most organizations don't have the ability to pull off an actual cyberattack, anyway, he says, so old-school espionage is a more common tack.

Former FBI cyber special agent and supervisory special agent Andre McGregor says the agency has seen industrial cyber espionage cases from time to time, some of which have involved a business using nefarious hacker-for-hire services to do their dirty work. "These have been more one-off intrusions rather than the norm," accounting for a small percentage of all cyber espionage, he says.

The FBI and other law enforcement agencies have been investigating and watching hacker-for-hire operations for years now, says McGregor, who recently joined Tanium as a director of cybersecurity. These are typically nation-state hackers who "moonlight" as cyber-mercenaries, he says.

As for the Astros' breach, McGregor says,"Traditional corporate espionage has now entered cyberspace."

Meanwhile, initial reports that the breach occurred via a list of reused passwords by Astros general manager Jeff Luhnow, who worked for the Cardinals organization from 2003 until 2011 when he took the job with Houston, were shot down today, as Luhnow told Sports Illustratedthat he did not use the same passwords he had used while with St. Louis. The breach itself was first discovered and publicized in June of 2014 when some data was posted online on Anonbin; this week was the first time the Cardinals organization had been publicly implicated in the FBI investigation.

Cardinals officials reportedly may have been worried that Luhnow had taken their team's proprietary information with him to the Astros, an allegation Luhnow also dismissed in his interview with SI.

Adam Meyers, vice president of intelligence at CrowdStrike, says business-on-business cyber spying is rare and definitely not at the same level of sophistication as a nation-state attack would be. "Breaking and entering" is a better way to describe the alleged attack on the Astros' database, he says. "They [reportedly] got access to information they weren't authorized to have," he says.

"Industrial espionage [itself] is a thing," Meyers says. "Businesses have sweeps of boardrooms before big meetings," for example, he points out.

What the Astros' breach illustrates is that the business side of sports organizations and all enterprises need to take cybersecurity threats more seriously, he says. "Information security isn't a computer nerd problem anymore. It's a business problem and needs to be treated as such," Meyers says. "If you are only relying on computer nerds to defend against these kinds of things," your business is at risk of attack, he says.

"You need to know from a business perspective how things are going to impact you," he says.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Cybersecurity tools and measures that are regularly implemented to protect sensitive IP in the technology and automotive industries could have easily alerted St. Louis that potential theft was taking place when its staffers left to join Houston and this could have been averted.

Rather, we have a case of spiteful employees angry at an ex-boss and looking to exact revenge. This shows that malice and a little bit of tech-savviness can damage an entire organization's competitive edge through a single intrusion into a rival team's network.

In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...

In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.